Vulnerability of Face Morphing Attacks: A Case Study on Lookalike and Identical Twins.
Raghavendra RamachandraSushma VenkateshGaurav JaswalGuoqiang LiPublished in: IWBF (2023)
Keyphrases
- security risks
- facial asymmetry
- buffer overflow
- human faces
- case study
- security vulnerabilities
- face images
- denial of service
- countermeasures
- facial expressions
- traffic analysis
- human identification
- dos attacks
- malicious users
- risk assessment
- security problems
- recognition algorithm
- test bed
- privacy preserving
- chosen plaintext
- face verification
- face databases
- facial images
- facial features